A method, system, and program for coordinating use of independent external resources within requesting grid environments. A external resource dispatcher receives requests for use of external resources. The external resource dispatcher controls the dispatch of a pool of external resources hidden from the grid management systems of requesting grid clients. In particular, the external resource dispatcher coordinates dispatch of a selection of the external resources for temporary registration with a requesting grid client management system. The requesting grid client management system registers the external resources for use within the grid client and monitors whether the external resources are still needed. When a requesting grid client no longer needs a dispatched external resource, the external resource dispatcher controls detachment of the dispatched external resource and returns the external resource to the available pool of external resources.
|
1. A method for coordinating use of independent external resources within a grid environment, comprising:
enabling a grid environment comprising a plurality of computing systems each comprising at least one resource and communicatively connected over a network through a grid management system to share each said at least one resource through a plurality of web services comprising simple object access protocol, web services description language, and extensible mark-up language interfaces implemented within a web service layer extended by an open grid services infrastructure atop a grid service layer implemented within an open grid services architecture;
self-registering, by an external resource dispatcher, with said grid management system and at least one additional grid management system;
receiving, at said external resource dispatcher, a request for resources from said grid management system, wherein said grid management system registers each said at least one resource for use within said grid environment, wherein a plurality of external resources are managed by said external resource dispatcher independent from each said at least one resource registered by said grid management system;
coordinating dispatch by said external resource dispatcher of a selection of external resources from among said plurality of external resources for temporary registration with said grid management system by said external resource dispatcher sending a request to said selection of external resources to join said grid environment and sending at least one network address and permission for said selection of external resources to said grid management system, such that use of said selection of external resources is coordinated when said plurality of grid resources already registered for use within said a grid environment are insufficient;
responsive to said grid management system receiving said at least one network address and permission for said selection of external resources, sending by said grid management system an acknowledgement to said selection of external resources to invite said selection of external resources to join said grid environment;
responsive to said selection of external resources receiving said acknowledgement from said grid management system, attaching by said external resources to said grid management system and directing by said external resources said external resource dispatcher to monitor a connectivity heartbeat between said selection of external resources and said grid management system;
responsive to said external resource dispatcher detecting said direction to monitor said connectivity heartbeat from said external resources attached to said grid management system, metering the use of said selection of external resources by said grid management system and monitoring said connectivity heartbeat between said grid management system and said selection of external resources; and
responsive to said external resource dispatcher detecting a failed network connectivity heartbeat from said grid management system or said selection of external resources, retrieving said selection of external resources from said grid environment and stopping said metering of said user of said selection of external resources.
2. The method according to
authenticating, by said external resource dispatcher, said grid management system as an authorized recipient of said plurality of external resources.
3. The method according to
tracking, by said external resource dispatcher, an availability of each of said plurality of external resources.
4. The method according to
independently registering with an external resource dispatcher directory comprising a plurality of external resource dispatchers.
5. The method according to
enabling said external resource dispatcher to receive requests for external resources from a plurality of diverse grid management systems.
|
1. Technical Field
The present invention relates in general to improved performance and efficiency in grid environments and in particular to a method for controlling use of independent external resources by requesting grid management systems. Still more particularly, the present invention relates to controlling dispatch, metering use, and monitoring connectivity of a selection of independent external resources made accessible to a particular requesting grid management system.
2. Description of the Related Art
Ever since the first connection was made between two computer systems, new ways of transferring data, resources, and other information between two computer systems via a connection continue to develop. In typical network architectures, when two computer systems are exchanging data via a connection, one of the computer systems is considered a client sending requests and the other is considered a server processing the requests and returning results. In an effort to increase the speed at which requests are handled, server systems continue to expand in size and speed. Further, in an effort to handle peak periods when multiple requests are arriving every second, server systems are often joined together as a group and requests are distributed among the grouped servers. Multiple methods of grouping servers have developed such as clustering, multi-system shared data (sysplex) environments, and enterprise systems. With a cluster of servers, one server is typically designated to manage distribution of incoming requests and outgoing responses. The other servers typically operate in parallel to handle the distributed requests from clients. Thus, one of multiple servers in a cluster may service a client request without the client detecting that a cluster of servers is processing the request.
Typically, servers or groups of servers operate on a particular network platform, such as Unix or some variation of Unix, and provide a hosting environment for running applications. Each network platform may provide functions ranging from database integration, clustering services, and security to workload management and problem determination. Each network platform typically offers different implementations, semantic behaviors, and application programming interfaces (APIs).
Merely grouping servers together to expand processing power, however, is a limited method of improving efficiency of response times in a network. Thus, increasingly, within a company network, rather than just grouping servers, servers and groups of server systems are organized as distributed resources. There is an increased effort to collaborate, share data, share cycles, and improve other modes of interaction among servers within a company network and outside the company network. Further, there is an increased effort to outsource nonessential elements from one company network to that of a service provider network. Moreover, there is a movement to coordinate resource sharing between resources that are not subject to the same management system, but still address issues of security, policy, payment, and membership. For example, resources on an individual's desktop are not typically subject to the same management system as resources of a company server cluster. Even different administrative groups within a company network may implement distinct management systems.
The problems with decentralizing the resources available from servers and other computing systems operating on different network platforms, located in different regions, with different security protocols and each controlled by a different management system, has led to the development of Grid technologies using open standards for operating a grid environment. Grid environments support the sharing and coordinated use of diverse resources in dynamic, distributed, virtual organizations. A virtual organization is created within a grid environment when a selection of resources, from geographically distributed systems operated by different organizations with differing policies and management systems, is organized to handle a job request.
A problem encountered in most network systems, whether organized in clusters or grids, is how to handle requests during peak usage times. One solution for handling requests during peak usage is to register sufficient resources with the resource manager of the cluster or grid so that the network can access sufficient resources to handle predicted peak usage. This solution helps to ensure maintenance of performance standards, however, it may also be cost ineffective to purchase resources that are only used for short bursts of time. Another solution for handling requests during peak usage is to register a pool of reserve or on-demand resources to the resource manager so that the network can access these reserved resources only during peak usage times and may pay only for use of the reserved resources. While both of these solutions provide methods of maintaining performance during peak usage, both are limited in that the pool of additional resources are registered as on reserve with the resource manager of a particular resource manager.
In view of the foregoing, it would be advantageous to provide a method, system, and program for controlling use of independent external resources by multiple requesting grid resource managers. In particular, it would be advantageous to control external resources available in a resource pool independent of a requesting grid resource manager. Further, it would be advantageous to provide a method, system, and program for dispatching independent external resources among multiple requesting grids, metering the use of independent external resources by multiple requesting grids, and polling the external resources to ensure connectivity to the multiple requesting grids.
In view of the foregoing, the method, system, and program provide improved performance in grid environments and in particular provide for controlling use of independent external resources by requesting grid management systems. Still more particularly, the method, system, and program provide for controlling dispatch, metering use, and monitoring connectivity of a selection of independent external resources made accessible to a particular requesting grid management system.
According to one aspect of the invention, an external resource dispatcher receives requests for use of resources. The external resource dispatcher controls the dispatch of a pool of external resources hidden from the grid management systems of requesting grid clients. The external resource dispatcher may first authenticate the identity of a requesting grid client and determine whether the requesting grid client is authorized to receive the requested resources. Then, the external resource dispatcher determines whether there are any external resources available to meet the resource request. In particular, the external resource dispatcher tracks and controls the availability status of the external resources. The external resource dispatcher coordinates dispatch of a selection of the external resources for temporary registration with a requesting grid management system. The requesting grid management system registers the external resources and monitors whether the external resources are still needed. When a requesting grid client no longer needs a dispatched external resource, the external resource dispatcher controls detachment of the dispatched external resource and returns the external resource to the available pool of external resources.
According to another aspect of the invention, the external resource dispatcher establishes heartbeats with the grid management system and the dispatched external resource. The external resource dispatcher polls the grid management system to determine if there is connectivity between the grid management system and the dispatched external resource. If the external resource dispatcher does not detect a heartbeat, the external resource dispatcher will detach the dispatched external resource and return the external resource to the available external resource pool. In addition, if the external resource dispatcher does not detect a heartbeat from the dispatched external resource, then the external resource dispatcher will mark the dispatched external resource as failed and dispatch a replacement resource to the grid management system.
According to yet another aspect of the invention, the external resource dispatcher is self-registering with an external resource dispatcher directory. Thus, multiple grid management systems may access and send requests for external resources to the external resource dispatcher.
According to a further aspect of the invention, the external resource dispatcher meters the use of dispatched external resources by grid clients. Advantageously, external resource dispatcher independently meters usage such that costs for use of external resources can be determined based on an independent metering of usage. In one example, a grid management system may be registered with an external resource dispatcher with limits on the number of hours or cost per period of time available for metering use of external resources used by the grid management system. Additional aspects of the present invention will become apparent in the following detailed description.
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself however, as well as a preferred mode of use, further objects and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
Referring now to the drawings and in particular to
In one embodiment, computer system 100 includes a bus 122 or other device for communicating information within computer system 100, and at least one processing device such as processor 112, coupled to bus 122 for processing information. Bus 122 preferably includes low-latency and higher latency paths that are connected by bridges and adapters and controlled within computer system 100 by multiple bus controllers. When implemented as a server system, computer system 100 typically includes multiple processors designed to improve network servicing power.
Processor 112 may be a general-purpose processor such as IBM's PowerPC™ processor that, during normal operation, processes data under the control of operating system and application software accessible from a dynamic storage device such as random access memory (RAM) 114 and a static storage device such as Read Only Memory (ROM) 116. The operating system may provide a graphical user interface (GUI) to the user. In a preferred embodiment, application software contains machine executable instructions that when executed on processor 112 carry out the operations depicted in the flowchart of
The present invention may be provided as a computer program product, included on a machine-readable medium having stored thereon the machine executable instructions used to program computer system 100 to perform a process according to the present invention. The term “machine-readable medium” as used herein includes any medium that participates in providing instructions to processor 112 or other components of computer system 100 for execution. Such a medium may take many forms including, but not limited to, non-volatile media, volatile media, and transmission media. Common forms of non-volatile media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape or any other magnetic medium, a compact disc ROM (CD-ROM) or any other optical medium, punch cards or any other physical medium with patterns of holes, a programmable ROM (PROM), an erasable PROM (EPROM), electrically EPROM (EEPROM), a flash memory, any other memory chip or cartridge, or any other medium from which computer system 100 can read and which is suitable for storing instructions. In the present embodiment, an example of a non-volatile medium is mass storage device 118 which as depicted is an internal component of computer system 100, but will be understood to also be provided by an external device. Volatile media include dynamic memory such as RAM 114. Transmission media include coaxial cables, copper wire or fiber optics, including the wires that comprise bus 122. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency or infrared data communications.
Virtual resource 160 may include a virtual representation of the resources accessible from a single system or systems, wherein multiple systems may each be considered discrete sets of resources operating on independent platforms, but coordinated as a virtual resource by a grid manager. Communications interface 132 provides a two-way data communications coupling to network link 134 that may be connected, for example, to a local area network (LAN), wide area network (WAN), or an Internet Service Provider (ISP) that provide access to network 102. In particular, network link 134 may provide wired and/or wireless network communications to one or more networks, such as network 102, through which use of virtual resources, such as virtual resource 160, is accessible.
As one example, network 102 may refer to the worldwide collection of networks and gateways that use protocols, such as Transmission Control Protocol (TCP) and Internet Protocol (IP), to communicate with one another. Network 102 uses electrical, electromagnetic, or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 134 and through communication interface 132, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information. It will be understood that alternate types of networks, combinations of networks, and infrastructures of networks may be implemented.
When implemented as a server system, computer system 100 typically includes multiple communication interfaces accessible via multiple peripheral component interconnect (PCI) bus bridges connected to an input/output controller. In this manner, computer system 100 allows connections to multiple network computers.
Additionally, although not depicted, multiple peripheral components and internal/external devices may be added to computer system 100, connected to multiple controllers, adapters, and expansion slots coupled to one of the multiple levels of bus 122. For example, a display device, audio device, keyboard, or cursor control device may be added as a peripheral component.
Those of ordinary skill in the art will appreciate that the hardware depicted in
With reference now to
The central goal of a grid environment, such as grid environment 240 is organization and delivery of resources from multiple discrete systems viewed as virtual resource 160. Client system 200, server clusters 222, servers 224, workstations and desktops 226, data storage systems 228, networks 230 and the systems creating grid management system 150 may be heterogeneous and regionally distributed with independent management systems, but enabled to exchange information, resources, and services through a grid infrastructure enabled by grid management system 150. Further, server clusters 222, servers 224, workstations and desktops 226, data storage systems 228, and networks 230 may be geographically distributed across countries and continents or locally accessible to one another.
In the example, client system 200 interfaces with grid management system 150. Client system 200 may represent any computing system sending requests to grid management system 150. In particular, client system 200 may send job requests and jobs to grid management system 150. Further, while in the present embodiment client system 200 is depicted as accessing grid environment 240 with a request, in alternate embodiments client system 200 may also operate within grid environment 240.
While the systems within virtual resource 160 are depicted in parallel, in reality, the systems may be part of a hierarchy of systems where some systems within virtual resource 160 may be local to client system 200, while other systems require access to external networks. Additionally, it is important to note, that systems depicted within virtual resources 160 may be physically encompassed within client system 200.
One function of grid management system 150 is to manage job requests and jobs from client system 200 and control distribution of each job to a selection of computing systems of virtual resource 160 for use of particular resources at the available computing systems within virtual resource 160. From the perspective of client system 200, however, virtual resource 160 handles the request and returns the result without differentiating between which computing system in virtual resource 160 actually performed the request.
To implement grid environment 240, grid management system 150 facilitates grid services. Grid services may be designed according to multiple architectures, including, but not limited to, the Open Grid Services Architecture (OGSA). In particular, grid management system 150 refers to the management environment which creates a grid by linking computing systems into a heterogeneous network environment characterized by sharing of resources through grid services.
Grid environment 240, as managed by grid management system 150, may provide a single type of service or multiple types of services. For example, computational grids, scavenging grids, and data grids are example categorizations of the types of services provided in a grid environment. Computational grids may manage computing resources of high-performance servers. Scavenging grids may scavenge for CPU resources and data storage resources across desktop computer systems. Data grids may manage data storage resources accessible, for example, to multiple organizations or enterprises. It will be understood that a grid environment is not limited to a single type of grid categorization.
According to an advantage of the present invention, when grid management system 150 detects a need for additional resources beyond the resources registered and included in virtual resource 160, grid management system 150 may send requests for independent external resources to external resource dispatchers, such as external resource dispatchers 250a-250n. Each of external resource dispatchers 250a-250n control a pool of independent external resources.
As will be further described, external resource dispatchers 250a-250n may dispatch independent external resources to grid environment 240 for temporary management by grid management system 150. In particular, the pools of independent external resources preferably remain hidden from grid management system 150 until proper authentication is performed to allow grid management system 150 to temporarily manage sections of independent external resources. External resource dispatchers 250a-250n meter the use of external resources, lock the external resources while in use by grid management system 150, and poll the external resources to ensure connectivity and functionality.
It will be understood that the pools of external resources managed by external resource dispatchers 250a-250n may be accessible by multiple grid management systems. In particular, external resource dispatchers 250a-250n preferably operate independent of any one grid environment and are self-registering with a directory of external resource dispatchers.
Referring now to
Within architecture 300, first, a physical and logical resources layer 330 organizes the resources of the systems in the grid. Physical resources include, but are not limited to, servers, storage media, and networks. The logical resources virtualize and aggregate the physical layer into usable resources such as operating systems, processing power, memory, I/O processing, file systems, database managers, directories, memory managers, and other resources.
Next, a web services layer 320 provides an interface between grid services 310 and physical and logical resources 330. Web services layer 320 implements service interfaces including, but not limited to, Web Services Description Language (WSDL), Simple Object Access Protocol (SOAP), and eXtensible mark-up language (XML) executing atop an Internet Protocol (IP) or other network transport layer. Further, the Open Grid Services Infrastructure (OSGI) standard 322 builds on top of current web services 320 by extending web services 320 to provide capabilities for dynamic and manageable Web services required to model the resources of the grid. In particular, by implementing OGSI standard 322 with web services 320, grid services 310 designed using OGSA are interoperable. In alternate embodiments, other infrastructures or additional infrastructures may be implemented a top web services layer 320.
Grid services layer 310 includes multiple services. For example, grid services layer 310 may include grid services designed using OGSA, such that a uniform standard is implemented in creating grid services. Alternatively, grid services may be designed under multiple architectures. Grid services can be grouped into four main functions. It will be understood, however, that other functions may be performed by grid services.
First, a resource management service 302 manages the use of the physical and logical resources. Resources may include, but are not limited to, processing resources, memory resources, and storage resources. Management of these resources includes receiving job requests, scheduling job requests, distributing jobs, and managing the retrieval of the results for jobs. Resource management service 302 preferably monitors resource loads and distributes jobs to less busy parts of the grid to balance resource loads and absorb unexpected peaks of activity. In particular, a user may specify preferred performance levels so that resource management service 302 distributes jobs to maintain the preferred performance levels within the grid.
Second, information services 304 manages the information transfer and communication between computing systems within the grid. Since multiple communication protocols may be implemented, information services 304 preferably manages communications across multiple networks utilizing multiple types of communication protocols.
Third, a data management service 306 manages data transfer and storage within the grid. In particular, data management service 306 may move data to nodes within the grid where a job requiring the data will execute. A particular type of transfer protocol, such as Grid File Transfer Protocol (GridFTP), may be implemented.
Finally, a security service 308 applies a security protocol for security at the connection layers of each of the systems operating within the grid. Security service 308 may implement security protocols, such as Open Secure Socket Layers (SSL), to provide secure transmissions. Further, security service 308 may provide a single sign-on mechanism, so that once a user is authenticated, a proxy certificate is created and used when performing actions within the grid for the user.
Multiple services may work together to provide several key functions of a grid computing system. In a first example, computational tasks are distributed within a grid. Data management service 306 may divide up a computation task into separate grid services requests of packets of data that are then distributed by and managed by resource management service 302. The results are collected and consolidated by data management system 306. In a second example, the storage resources across multiple computing systems in the grid are viewed as a single virtual data storage system managed by data management service 306 and monitored by resource management service 302.
An applications layer 340 includes applications that use one or more of the grid services available in grid services layer 310. Advantageously, applications interface with the physical and logical resources 330 via grid services layer 310 and web services 320, such that multiple heterogeneous systems can interact and interoperate.
With reference now to
Within a grid environment, such as grid 400, a grid management system 408 manages grid resources 405 registered and available within grid 400. In particular, grid management system 408 may include multiple grid management components distributed across multiple resources. In the example, however, logically, grid management system 408 includes a resource monitor 402 for registering and monitoring resource availability. In addition, grid management system 408 includes a grid scheduler 404 that controls the scheduling and distribution of jobs to grid resources 405. Grid scheduler 404 also manages time synchronization between the various resources handling a particular job. The status and results of jobs are tracked within a job queue 406.
A requesting agent 409 within grid management system 408 requests external resources from external resource dispatcher 420 via network 102. While in the example depicted there is a single external resource dispatcher, it will be understood that requesting agent 409 may send requests for external resources to multiple external resource dispatchers. In addition, requesting agent 409 may access a directory of external resource dispatchers, where the directory indicates the types of resources, costs, performance specifications, and other information about the external resource pools controlled by each of the external resource dispatchers in the directory.
In the embodiment depicted, external resource dispatcher 420 manages the distribution of a pool of external resources, such as external resources 422, 424, and 426, to requesting grid clients. External resources 422, 424, and 426 may include, but are not limited to, non-grid computing systems or another grid which presents itself as a resource that can be requested as an external resource.
In particular, when requesting agent 409 requests external resources from external resource dispatcher 420, the actual resources are hidden grid management system 408 until proper authentication is performed. In particular, responsive to receiving a request for external resources, external resource dispatcher 420 may determine if a client requesting external resource is authenticated. A client connection authentication database 410 preferably stores the identity information needed to authenticate registered clients. In addition, as a client uses resources, the metered use may be added to the client connection authentication database entries, such that if a client registers for a limited amount of resources, that resource use is calculated and updated in client connection authentication database 410. Table 1 depicts an example of the types of information that may be included in client connection authentication database 410. It will be understood that multiple types of identity authentication may be performed including, but not limited to, public/private key encryption authentication.
TABLE 1
Example Client Connection Authentication Database Entries
Grid
Grid
client ID
Client Key
Resource Authorization
Grid A
ghd3k4
All
Grid B
erk20we
Processing power
Grid C
dkd3k3
All; 1 hour per day
In addition, in responsive to receiving a request for external resources, external resource dispatcher 420 determines whether there are resources available to meet the external resource request. A resource availability database 412 preferably maintains a table of the current external resource availability and information including, but not limited to, IP address, resource types, resource capacity, cost, and special resource. In addition, the rights and privileges for each resource are preferably included for each resource entry in resource availability table 412. Table 2 depicts an example of some of the types of information that may be included in resource availability database 412.
TABLE 2
Example Resource Availability Database Entries
Type
IP Address
Capacity
Cost
Processing
23.14.202.101
4
GHz
.05
per second
Processing
23.14.320.230
10
GHz
.10
per second
Disk space
20.10.100.202
100
GB
$8.00
per GB
One advantage of using external resource dispatcher to distribute external grid resources is that external resource dispatcher 420 is self registering and self-metering. Thus, external resource dispatcher 420 can register as an external controller independent of any one grid. In addition, external resource dispatcher 420 can independent monitor the use of external resources by grid clients.
Referring now to
With reference now to
Next, as depicted at reference numeral 610, the network address and permissions for the resource to join the grid client are sent to the grid client. As depicted at reference numeral 612, the grid client will register the resource in the resource directory managed by the grid client resource management system. Next, as depicted at reference numeral 614, the grid client sends an acknowledgement (ACK) that the resource may join the grid client to the external resource. Thereafter, as depicted at reference numeral 616, the external resource attaches to the grid client and establishes a heartbeat to the external resource and the grid client. As depicted at reference numeral 618, the external resource notifies the ERD that the resource has attached to the grid client.
After the external resource attaches to the grid client, the grid client monitors whether the resource is needed, as depicted at reference numeral 620, and the ERD meters resource use, as depicted at reference numeral 621. When the grid client no longer needs the external resource, the grid client sends the ERD a detach request, as depicted at reference numeral 622. The ERD then sends an acknowledgement of the request from the grid client, as depicted at reference numeral 624, and sends a detach request signal to the external resource, as depicted at reference numeral 626. The external resource then detaches, as depicted at reference numeral 628 and the external resource sends a detach acknowledge signal to the ERD, as depicted at reference numeral 630. The ERD then updates the external resource status to available, as depicted at reference numeral 632, and stops metering, as depicted at reference numeral 634.
In addition, although not depicted, once a heartbeat is established between the ERD and the grid client, the ERD monitors connectivity and will retrieve the dispatched external resource if connectivity is no longer detected. In addition, once a heartbeat is established between the ERD and the dispatched external resource, the ERD monitors for failure and will retrieve the dispatched external resource and replace it with an active external resource if failure is detected.
Referring now to
When an external resource managed by external resource dispatcher 420 is dispatched to a client grid, such as grid 400, preferably, heartbeats are established from external resource dispatcher 420 to grid 400 and to external resource 422. In the example, a heartbeat 502 is depicted connecting external resource 422 with external resource dispatcher 420. Heartbeat connection 502 allows external resource dispatcher 420 to monitor when a resource has failed. In addition, a heartbeat 504 is depicted connecting grid 400 with external resource dispatcher 420. In particular, heartbeat connection 504 allows external resource dispatcher 420 to monitor whether there is connectivity between grid 400 and external resource 422.
With reference now to
Block 804 depicts a determination whether the requesting grid client is properly authenticated. If the requesting grid client is not properly authenticated, then the process passes to block 808. Block 808 depicts returning a lack of authentication message to the requesting grid client, and the process ends. If the request grid client is properly authenticated, then the process passes to block 810.
Block 810 depicts comparing the resource request with the resource available in the resource availability database. Next, block 812 illustrates a determination whether the requested resource is available. If the requested resource is not available, then the process passes to block 816.
Block 816 depicts returning a lack of resource availability message to the requesting grid client. If the requested resource is available, then the process passes to block 814. Block 814 depicts sending a signal to the available external resource to joint the grid client. Next, block 818 depicts sending the IP address and permission for the external resource to the grid client. Thereafter, block 820 depicts a determination whether an attachment signal is received from the external resource. The process iterates at block 820 until an attachment signal is received. Alternatively, if no attachment signal is received, after a particular time, the process may time out. If an attachment signal is received, then the process passes to block 822.
Block 822 depicts updating the status of the external resource as currently dispatched. Next, block 824 depicts starting metering of use of the external resource by the grid client. Thereafter, block 826 depicts a determination whether a detach request is received. If a detach request is not received, then the process iterates at block 826. A detach request may also be invoked if the external resource dispatcher does not detect a heartbeat from a resource or from a grid connection to a resource. In addition, a detach request may also be invoked if the period of time allowed in the privileges for the grid client to use a resource expires. Once a detach request is received, the process passes to block 828.
Block 828 depicts sending a detach signal to the external resource. Next, block 830 depicts a determination whether a detach acknowledge is received from the external resource. The process iterates at block 830 until a detach acknowledge is received and then passes to block 832. Block 832 depicts updating the status of the external resource as available. Next, block 834 depicts stopping the metering for use of the external resource by the grid client, and the process ends.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
Trevathan, Matthew B., Bond, Robert W., McCulloch, Douglas J., Richards, Jr., Patrick J., Tallam, Sambasiva R.
Patent | Priority | Assignee | Title |
10310467, | Aug 30 2016 | Honeywell International Inc.; Honeywell International Inc | Cloud-based control platform with connectivity to remote embedded devices in distributed control system |
10333862, | Mar 16 2005 | III Holdings 12, LLC | Reserving resources in an on-demand compute environment |
10445146, | Mar 16 2006 | III Holdings 12, LLC | System and method for managing a hybrid compute environment |
10503145, | Mar 25 2015 | Honeywell International Inc. | System and method for asset fleet monitoring and predictive diagnostics using analytics for large and varied data sources |
10608949, | Mar 16 2005 | III Holdings 12, LLC | Simple integration of an on-demand compute environment |
10657199, | Feb 25 2016 | Honeywell International Inc. | Calibration technique for rules used with asset monitoring in industrial process control and automation systems |
10776706, | Feb 25 2016 | Honeywell International Inc.; Honeywell International Inc | Cost-driven system and method for predictive equipment failure detection |
10853482, | Jun 03 2016 | Honeywell International Inc. | Secure approach for providing combined environment for owners/operators and multiple third parties to cooperatively engineer, operate, and maintain an industrial process control and automation system |
10977090, | Mar 16 2006 | III Holdings 12, LLC | System and method for managing a hybrid compute environment |
11134022, | Mar 16 2005 | III Holdings 12, LLC | Simple integration of an on-demand compute environment |
11194451, | Jul 07 2017 | Open Text Corporation | Systems and methods for content sharing through external systems |
11237550, | Mar 28 2018 | Honeywell International Inc. | Ultrasonic flow meter prognostics with near real-time condition based uncertainty analysis |
11356385, | Mar 16 2005 | III Holdings 12, LLC | On-demand compute environment |
11467883, | Mar 13 2004 | III Holdings 12, LLC | Co-allocating a reservation spanning different compute resources types |
11494235, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11496415, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
11522811, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
11522952, | Sep 24 2007 | The Research Foundation for The State University of New York | Automatic clustering for self-organizing grids |
11526304, | Oct 30 2009 | III Holdings 2, LLC | Memcached server functionality in a cluster of data processing nodes |
11533274, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
11537434, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11537435, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11630704, | Aug 20 2004 | III Holdings 12, LLC | System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information |
11650857, | Mar 16 2006 | III Holdings 12, LLC | System and method for managing a hybrid computer environment |
11652706, | Jun 18 2004 | III Holdings 12, LLC | System and method for providing dynamic provisioning within a compute environment |
11656907, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11658916, | Mar 16 2005 | III Holdings 12, LLC | Simple integration of an on-demand compute environment |
11709709, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11720290, | Oct 30 2009 | III Holdings 2, LLC | Memcached server functionality in a cluster of data processing nodes |
11762694, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11765101, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
11799711, | Oct 07 2016 | Convida Wireless, LLC | Service layer resource management for generic interworking and extensibility |
11829583, | Jul 07 2017 | Open Text SA ULC | Systems and methods for content sharing through external systems |
11831564, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
11861404, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11886915, | Nov 08 2004 | III Holdings 12, LLC | System and method of providing system jobs within a compute environment |
11960937, | Mar 13 2004 | III Holdings 12, LLC | System and method for an optimizing reservation in time of compute resources based on prioritization function and reservation policy parameter |
12120040, | Mar 16 2005 | III Holdings 12, LLC | On-demand compute environment |
12124878, | Mar 13 2004 | III Holdings 12, LLC | System and method for scheduling resources within a compute environment using a scheduler process with reservation mask function |
12155582, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
12160371, | Apr 07 2005 | III Holdings 12, LLC | On-demand access to compute resources |
12177061, | Oct 07 2016 | Convida Wireless, LLC | Service layer resource management for generic interworking and extensibility |
7668741, | Jan 06 2005 | TWITTER, INC | Managing compliance with service level agreements in a grid environment |
7707288, | Jan 06 2005 | TWITTER, INC | Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment |
7712100, | Sep 14 2004 | International Business Machines Corporation | Determining a capacity of a grid environment to handle a required workload for a virtual grid job request |
7734679, | Jan 14 2004 | International Business Machines Corporation | Managing analysis of a degraded service in a grid environment |
7739155, | Jan 12 2005 | International Business Machines Corporation | Automatically distributing a bid request for a grid job to multiple grid providers and analyzing responses to select a winning grid provider |
7743142, | Jan 06 2005 | International Business Machines Corporation | Verifying resource functionality before use by a grid job submitted to a grid environment |
7761557, | Jan 06 2005 | International Business Machines Corporation | Facilitating overall grid environment management by monitoring and distributing grid activity |
7788375, | Jan 06 2005 | International Business Machines Corporation | Coordinating the monitoring, management, and prediction of unintended changes within a grid environment |
7793308, | Jan 06 2005 | International Business Machines Corporation | Setting operation based resource utilization thresholds for resource use by a process |
7870251, | Jan 10 2008 | AT&T Intellectual Property I, L.P. | Devices, methods, and computer program products for real-time resource capacity management |
7882254, | Nov 25 2002 | Korea Electronics Technology Institute | Common protocol layer architecture and methods for transmitting data between different network protocols and a common protocol packet |
7899921, | Dec 08 2004 | Microsoft Technology Licensing, LLC | Verifying and maintaining connection liveliness in a reliable messaging for web services environment |
7921133, | Jun 10 2004 | International Business Machines Corporation | Query meaning determination through a grid service |
7970830, | Apr 01 2009 | Honeywell International Inc.; Honeywell International Inc | Cloud computing for an industrial automation and manufacturing system |
8087066, | Apr 12 2007 | Oracle America, Inc | Method and system for securing a commercial grid network |
8136118, | Jan 14 2004 | International Business Machines Corporation | Maintaining application operations within a suboptimal grid environment |
8204717, | Apr 01 2009 | Honeywell International Inc.; Honeywell International Inc | Cloud computing as a basis for equipment health monitoring service |
8275881, | Jan 13 2004 | International Business Machines Corporation | Managing escalating resource needs within a grid environment |
8387058, | Jan 13 2004 | International Business Machines Corporation | Minimizing complex decisions to allocate additional resources to a job submitted to a grid environment |
8396757, | Jan 12 2005 | International Business Machines Corporation | Estimating future grid job costs by classifying grid jobs and storing results of processing grid job microcosms |
8495153, | Dec 14 2009 | EMC IP HOLDING COMPANY LLC | Distribution of messages in nodes connected by a grid architecture |
8555381, | Apr 01 2009 | Honeywell International Inc.; Honeywell International Inc | Cloud computing as a security layer |
8583650, | Jan 06 2005 | KYNDRYL, INC | Automated management of software images for efficient resource node building within a grid environment |
8612862, | Jun 27 2008 | Microsoft Technology Licensing, LLC | Integrated client for access to remote resources |
8683062, | Feb 28 2008 | Microsoft Technology Licensing, LLC | Centralized publishing of network resources |
9002965, | Dec 14 2009 | EMC IP HOLDING COMPANY LLC | Distribution of messages in nodes connected by a grid architecture |
9218000, | Apr 01 2009 | Honeywell International Inc.; Honeywell International Inc | System and method for cloud computing |
9294345, | Jul 06 2007 | LG ELECTRONICS, INC | Wireless network management procedure, station supporting the procedure, and frame format for the procedure |
9412137, | Apr 01 2009 | Honeywell International Inc.; Honeywell International Inc | Cloud computing for a manufacturing execution system |
9596153, | Sep 09 2011 | Microsoft Technology Licensing, LLC | Wake pattern management |
9736050, | Sep 09 2011 | Microsoft Technology Licensing, LLC | Keep alive management |
9939876, | Sep 09 2011 | Microsoft Technology Licensing, LLC | Operating system management of network interface devices |
9961013, | Mar 16 2005 | III Holdings 12, LLC | Simple integration of on-demand compute environment |
9979672, | Mar 16 2005 | III Holdings 12, LLC | System and method providing a virtual private cluster |
ER1475, | |||
ER2853, | |||
ER9943, |
Patent | Priority | Assignee | Title |
4591980, | Feb 16 1984 | Xerox Corporation | Adaptive self-repairing processor array |
5220674, | Jul 17 1987 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Local area print server for requesting and storing required resource data and forwarding printer status message to selected destination |
5630156, | Oct 18 1993 | France Telecom | Process for parallel operation of several computation units, especially in image processing, and corresponding architecture |
5729472, | May 17 1996 | TREND MICRO INCORPORATED | Monitoring architecture |
5884046, | Oct 23 1996 | PARITY NETWORKS LLC | Apparatus and method for sharing data and routing messages between a plurality of workstations in a local area network |
5931911, | Nov 23 1992 | EVIDAN | Information processing device enabling the management of an information resource by an administration system |
6049828, | Sep 17 1990 | CONCORD COMMUNICATIONS, INC ; Computer Associates Think, Inc | Method and apparatus for monitoring the status of non-pollable devices in a computer network |
6154787, | Jan 21 1998 | Unisys Corporation | Grouping shared resources into one or more pools and automatically re-assigning shared resources from where they are not currently needed to where they are needed |
6167445, | Oct 26 1998 | Cisco Technology, Inc. | Method and apparatus for defining and implementing high-level quality of service policies in computer networks |
6182139, | Aug 05 1996 | RESONATE INC | Client-side resource-based load-balancing with delayed-resource-binding using TCP state migration to WWW server farm |
6310889, | Mar 12 1998 | AVAYA Inc | Method of servicing data access requests from users |
6430711, | Jan 06 1998 | Seiko Epson Corporation | System and method for monitoring the state of a plurality of machines connected via a computer network |
6452692, | Dec 02 1996 | Sun Microsystems, Inc. | Networked printer server |
6460082, | Jun 17 1999 | SANDPIPER CDN, LLC | Management of service-oriented resources across heterogeneous media servers using homogenous service units and service signatures to configure the media servers |
6463454, | Jun 17 1999 | SANDPIPER CDN, LLC | System and method for integrated load distribution and resource management on internet environment |
6470384, | Oct 28 1999 | JPMORGAN CHASE BANK, N A ; MORGAN STANLEY SENIOR FUNDING, INC | Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment |
6499049, | Oct 11 1996 | Sun Microsystems, Inc. | Lease renewal service |
6552813, | Jun 11 1996 | Oracle America, Inc | Directing print jobs in a network printing system |
6560609, | Jun 14 1999 | International Business Machines Corporation | Delegating instance management functions to underlying resource managers |
6578160, | May 26 2000 | EMC IP HOLDING COMPANY LLC | Fault tolerant, low latency system resource with high level logging of system resource transactions and cross-server mirrored high level logging of system resource transactions |
6625643, | Nov 13 1998 | AKAMAI TECHNOLOGIES, INC | System and method for resource management on a data network |
6654759, | Nov 26 1999 | Bull S.A. | Method for access via various protocols to objects in a tree representing at least one system resource |
6654807, | Feb 10 1998 | SANDPIPER CDN, LLC | Internet content delivery network |
6701342, | Dec 21 1999 | Viavi Solutions Inc | Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements |
6714987, | Nov 05 1999 | Apple Inc | Architecture for an IP centric distributed network |
6717694, | Jul 31 1998 | Canon Kabushiki Kaisha | Data transmission apparatus, system and method, and recording medium |
6732117, | Feb 27 2001 | EMC IP HOLDING COMPANY LLC | Techniques for handling client-oriented requests within a data storage system |
6742015, | Aug 31 1999 | Accenture Global Services Limited | Base services patterns in a netcentric environment |
6751662, | Jun 29 1999 | Cisco Technology, Inc. | Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network |
6816905, | Nov 10 2000 | RPX Corporation | Method and system for providing dynamic hosted service management across disparate accounts/sites |
6941865, | Oct 23 2000 | Canon Kabushiki Kaisha | Processing for reassigning print jobs following print error in distributed printing |
6954739, | Nov 16 1999 | WSOU Investments, LLC | Measurement-based management method for packet communication networks |
6963285, | Sep 30 2002 | TXU Energy Retail Company LLC | Outage notification device and method |
7050184, | Apr 30 1998 | Canon Kabushiki Kaisha | Data transfer apparatus and method, and data transfer system and medium |
7086086, | Feb 27 1999 | ZITOVAULT, LLC | System and method for maintaining N number of simultaneous cryptographic sessions using a distributed computing environment |
7096248, | May 25 2000 | The United States of America as represented by the Secretary of the Navy | Program control for resource management architecture and corresponding programs therefor |
7123375, | Apr 10 2001 | Seiko Epson Corporation | Printer, POS system, wireless communication control method, and data storage medium |
7171654, | May 25 2000 | NAVY, UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE, THE | System specification language for resource management architecture and corresponding programs therefore |
7181302, | Oct 03 2003 | META COMMAND SYSTEMS, INC | Method and system for network-based, distributed, real-time command and control of an enterprise |
7181743, | May 25 2000 | UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE NAVY, THE | Resource allocation decision function for resource management architecture and corresponding programs therefor |
7243121, | Jun 20 2002 | JPMORGAN CHASE BANK, N A | System and method for dividing computations |
7245584, | Nov 18 2002 | AVAYA LLC | Method and apparatus for auditing service level agreements by test packet insertion |
7269757, | Jul 11 2003 | Citrix Systems, Inc | Distributed computer monitoring system and methods for autonomous computer management |
7340654, | Jun 17 2004 | International Business Machines Corporation | Autonomic monitoring in a grid environment |
7426267, | Sep 04 2003 | WILMINGTON SAVINGS FUND SOCIETY, FSB | Declarative ACD routing with service level optimization |
7433931, | Nov 17 2004 | Raytheon Company | Scheduling in a high-performance computing (HPC) system |
7437675, | Feb 03 2003 | HEWLETT-PACKARD DEVELOPMENT COMPANY L P | System and method for monitoring event based systems |
7451106, | Nov 30 1998 | e-Lynxx Corporation | System and method for competitive pricing and procurement of customized goods and services |
20020023168, | |||
20020072974, | |||
20020152305, | |||
20020152310, | |||
20020165979, | |||
20020171864, | |||
20020188486, | |||
20030011809, | |||
20030036886, | |||
20030058797, | |||
20030101263, | |||
20030105868, | |||
20030108018, | |||
20030120701, | |||
20030126240, | |||
20030126265, | |||
20030140143, | |||
20030161309, | |||
20030191795, | |||
20030200347, | |||
20030204758, | |||
20030212782, | |||
20040064548, | |||
20040095237, | |||
20040103339, | |||
20040145775, | |||
20040213220, | |||
20040215590, | |||
20050027865, | |||
20050065994, | |||
20050108394, | |||
20050120160, | |||
20050138162, | |||
20050182838, | |||
20060075042, | |||
EP790559, | |||
EP1267552, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 07 2004 | TALLAM, SAMBASIVA R | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014819 | /0080 | |
Jun 08 2004 | MCCULLOCH, DOUGLAS J | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014819 | /0080 | |
Jun 08 2004 | RICHARDS, JR , PATRICK J | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014819 | /0080 | |
Jun 10 2004 | BOAD, ROBERT W | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014819 | /0080 | |
Jun 15 2004 | International Business Machines Corporation | (assignment on the face of the patent) | / | |||
Jun 17 2004 | TREVATHAN, MATTHEW B | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014819 | /0080 | |
Nov 18 2021 | International Business Machines Corporation | KYNDRYL, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 058213 | /0912 |
Date | Maintenance Fee Events |
Aug 14 2009 | ASPN: Payor Number Assigned. |
Aug 14 2009 | RMPN: Payer Number De-assigned. |
Apr 15 2013 | REM: Maintenance Fee Reminder Mailed. |
Sep 01 2013 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Sep 01 2012 | 4 years fee payment window open |
Mar 01 2013 | 6 months grace period start (w surcharge) |
Sep 01 2013 | patent expiry (for year 4) |
Sep 01 2015 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 01 2016 | 8 years fee payment window open |
Mar 01 2017 | 6 months grace period start (w surcharge) |
Sep 01 2017 | patent expiry (for year 8) |
Sep 01 2019 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 01 2020 | 12 years fee payment window open |
Mar 01 2021 | 6 months grace period start (w surcharge) |
Sep 01 2021 | patent expiry (for year 12) |
Sep 01 2023 | 2 years to revive unintentionally abandoned end. (for year 12) |